The next time you decide to instant message (IM) a colleague, consider this: IM content is neither secure nor private, according to technology and legal experts. While IM is generally a safe tool for personal communication, its content can be captured and used as evidence in lawsuits, according to Illinois-based IT Governance Institute international president Marios Damianides.
When network security vendor Cirond Corp. publicized a potential threat looming over wireless laptops eight months ago, there seemed to be no takers. Not until the company decided to call it the
Software vendors are banking on customer data integration (CDI) tools to boost sales of CRM systems. Toronto-based ACIS Consulting Inc. recently launched RapidAnswer, a search derivative application that integrates information across multiple channels
The ripple effect of data growth poses a huge challenge for IT departments tasked with maintaining availability and performance, while doing more with less. And it
When most people throw away an old computer they leave it on their front lawn for the municipal waste disposal truck to pick up. And then they carry on with their normal lives. Ever wonder where all the thousands of defunct PC monitors, television sets, keyboards, VCRs and other electronic waste end up? How many of them are recycled and refurbished, and how many are disposed of? More importantly, how is it affecting the environment?
When most people throw away an old computer they leave it on their front lawn for the municipal waste disposal truck to pick up. And then they carry on with their normal lives. Ever wonder where all the thousands of defunct PC monitors, television sets, keyboards, VCRs and other electronic waste end up? How many of them are recycled and refurbished, and how many are disposed of? More importantly, how is it affecting the environment?